THE SPECIFICATIONS REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO
CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE
PRESENTED WITHOUT W ARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST
TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
Licenses
Software
VPNet Technologies, Inc. (“VPNet”) and its suppliers grant to Customer (“Customer”) a nonexclusive and non-transferable license to us e VSU VPNos
single VPNware VSU de vi ce owned or leased by Customer.
Customer may make on e (1) archival copy of the Software provided Customer affixe s to such all
copyright, con f identiality an d proprietary not ices that appear on the original. EXCEPT AS
EXPRESSLY AUTHORIZED ABOVE, CUSTOMER SHALL NOT: COPY, IN WHOLE OR IN
PART, SOFTWARE OR DOCUMENTATION; MODIFY THE SOFTWARE; REVERSE
COMPILE OR REVERSE ASSEMBLE ALL OR ANY PORTION OF THE SOFTWARE; OR
RENT, LEASE, DISTRIBUTE, OR CREATE DERIVATIVE WORKS OF THE SOFTWARE.
Customer agrees that aspects of th e licensed materials, includi n g the specific des ig n and structur e of
individual programs, cons titute trade se crets and/or copyrighted material of VPNet. Customer agr ees
not to disclose, provide, or otherwise make available such trade secrets or copyrighted material in any
form to any third party without the prior written cons ent of VPNet. Customer agrees to implement
reasonable sec uri ty measur es to prote ct su ch tr ade s ecre ts and co pyr igh t ed mate rial . Title to Sof tware
and documentation shall remain solely with VPNet.
The license is effective until terminated. Customer may terminate this License at any time by
destroying all copies of Softwa re including any docume nta t ion . T hi s Lic e nse w i ll termi na te
immediately without notice from VPNet if Customer m ust de str oy all copies of Software.
Software, including t ec hni cal data, is subject to U.S. export control laws, including the U.S. Export
Administration Act and its associated regulations, and may be subject to export or import regulations
in other countries. Custom er agrees to comply strictly with all such regulations and ac knowledges
that it has the responsibility obtain lice nses t o export, re-export, or import Sof twa re .
This License sh all be governed by and con s trued in accord an ce w i th the laws of the Stat e of
Californi a, U nited States of Amer ica, as if performed wholly within th e st ate and without gi ving
effect to the principles of conflict of law. If any portion hereof is found to be void or unenforceable ,
the remaining provisions of this License shall remain in full force and effect. This license constitutes
the entire Li cense between th e parties with r esp ect to the use of the Software.
(“Software”) in objec t co de form on a
Restricted Rights – VPNet’s software is provided to non-DOD agencies with RESTRICTED
RIGHTS and its supporting documentation is provided with LIMITED RIGHTS. Use, duplication, or
disclosure by the Governm en t is subj e ct to th e re stri ct ions set forth in subparagrap h ‘C’ of the
Commercial Comput er Software – Restricted Rights cl ause at FAR 52.227-19. In the vent the sale is
to a DOD agency, the government’s rights in software, supporting documentation and technical data
are governed b y the restrictio ns in the Technical Data Commercial Items clause DFARS 252.2277015 and DFARS 227.7202.
VSU-2000 User Guide
Limited Warranty
Hardware
VPNet Technologies, Inc. (“VPNet”) warrants that for a period of one (1) ye a r from the da te of
shipment from VPNet that the Hardware will be free from defects in material and workmanship under
normal use. This limited warranty extends only to Customer as the original purchaser. Customer’s
exclusive remedy and the entire liability of V PN et and its suppliers under thi s lim i te d w arranty will
be, at VPNet or its service center's option, repair or replacement within ten (10) business days or
refund of the Hardware if returned to the party suppl ying the Hardware to Cust om er, freight and
insurance prepaid. VPN e t re placement parts used in Hardware repair may be ne w or e quivalent to
new.
Restrictions. This warranty does not apply if the pro duc t (a ) ha s bee n al te red, except by VPNet (b)
has not been installed, opera te d, rep ai red, or maintained in accorda nc e w it h in stru ctions supplied by
VPNet, (c) has been subjected to ab normal physical or electrical stress, misuse, ne gl ige nc e, or
accident, or (d) is used in ultr a hazardous activities.
DISCLAIMER OF WARRANTY. EXCEPT AS SPECIFIED IN THIS WARRANTY, ALL EXPRESS
OR IMPLIED CONDITIONS, REPRESENTATIONS, AND WARRANTIES INCLUDING,
WITHOUT LIMITATION, ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE, ARE HEREBY EXCLUDED TO THE EXTENT
ALLOWED BY APPLICABLE LAW.
IN NO EVENT WILL VPNET OR ITS SUPPLIERS BE LIABLE FOR ANY LOST REVENUE,
PROFIT, OR DATA, OR FOR SPECIAL INDIRECT, CONSEQUENTIAL, INCIDENTAL, OR
PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF
LIABILITY ARISING OUT OF THE USE OF OR INABILITY TO USE THE PRODUCT EVEN IF
VPNET OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. In no event shall VPNet's or its suppliers’ liability to Customer, whether in contract, tort
(including neglige nce), or otherwise, excee d the price paid by Customer. The foregoing lim i ta ti ons
shall apply even if the above-stated warranty fails of its essential purpose.
Software
VPNet warrants that for a pe ri od of ninety (90) days from the date of shi pm ent from VPNet: (i) the
media on which the Software is furnished will be free of defects in materials and workmanship under
normal use; and (ii) the Software substantially conforms to its published specifications. Except for the
foregoing, the Software is prov ided AS IS. This limited warrant y ext ends only to Customer as the
original licensee. Custome r’s exclusive remedy and the entire liability of VPNet and its suppliers
under this limited warranty will be, at VPNet or its service center’s option, repair, replacement, or
refund of the Software if reported (or, upon request, returned) to the party supplying the Soft ware to
Customer. In no event does VPNet warrant that the Software is error fr ee or that Customer will be
able to operate the Softw a re w i thout problems or interrupt ions.
Restrictions. This warranty does not apply if the pro duc t (a ) ha s bee n al te red, except by VPNet, (b)
has not been installed, opera te d, rep ai red, or maintained in accorda nc e w it h in stru ctions supplied by
VPNet, (c) has been subjected to ab normal physical or electrical stress, misuse, ne gl ige nc e, or
accident, or (d) is used in ultr a hazardous activities.
DISCLAIMER OF WAR RANTY. EXCEPT AS SPECIFIED IN THIS WARRANTY, ALL
EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS, AND WA RRA NTIES
INCLUDING, WITHOUT LIMITATION, ANY IMPL IED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OR
ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE, ARE HERBY
EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.
IN NO EVENT WILL VPNET OR ITS SUPPLIES BE LIABLE FOR ANY LOST REVENUE,
PROFIT, OR DATA, OR FOR SPECIAL INDIRECT, CONSEQUENTIAL, INCIDENTAL, OR
PUNITIVE DAMAGES HOWEVER CAUSED AND REGRADLESS OF THE THEORY OF
VSU-2000 User Guide
LIABILITY ARISING OUT OF THE USE OF OR INABILITY TO USE THE PRODUCT EVEN IF
VPNET OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. In no event shall VPNet’s or its suppliers’ liability to Customer, whether in contract, tort
(including neglige nce), or otherwise, exc ee d th e price paid by the Customer. The foregoing
limitations shall apply ev en if the above-stated warrant y fails of its essential purpose.
VPNware, VSU-1200, VSU-1100, VSU-1000, VSU-10, VPNmanager, VPNremote, VPLink, and
VPNet are trade marks belonging to VPNet Technologies, Inc. MD5 Message Digest Algorithm
Copyright RSA Security, Inc. All other product nam es m en ti one d in this manual are trademarks or
registered trademarks of their re s p ec tive manufacturers.
Compliance
The following information is for FCC compliance of Class A devices: This equipment has been tested
and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules.
These limits are designed to provide reasonabl e protection against harm ful interference whe n th e
equipment is operated in a commercial environment. This equipment generates, uses, and can radiate
radio-frequency en ergy and, if not installed and used in accordance with the instruct io n ma nual, may
cause harmful interference to radio communications. Operation of this equipment in a residential area
is likely to cause harmful interference, in which case users will be required to correct the interference
at their own expense.
BMSI (Chinese Warning Label)
Hardware, includi ng technical data, is subjec t to U.S. export control laws, including the U.S. Exp ort
Administration Act and its associated regulations, and may be subject to export or import regulations
in other countries. Custom er agrees to comply strictly with all such regulations and ac knowledges
that it has the responsibility to obt ai n li c ense s to e xport, re-export, or import ha rdware.
Trademarks
VSU, VPNmanager, VPNremote, VPLink, VPNos, and VPNet are trademarks belonging to VPNet
Technologies, Inc. MD5 Message Digest Algorithm copyrig ht RS A Data Security, Inc. All other
product names mentioned in this manual are trademarks or registered trademarks of their respective
manufacturers.
Copyright
VSU-2000 VPN Service Un it U ser G ui de
Copyright 2001 VPNet Technologies, Inc.
All rights reserved. Printed in USA.
This user guide provides installation and configuration information for the
VSU-2000 VPNware Service Unit (VSU).
How This Guide Is Organized
Chapter 1,
major components along with site requirements for safe installation and
operation of the VSU-2000.
Chapter 2,
installation, including placement and connection to the network. Procedures for
mounting the VSU-2000 in an equipment rack are also included in this chapter.
Chapter 3,
setting up VSU-2000 addressing and enabling remote connectivity for using the
VPNmanager, VPNet’s VPN network management application.
Appendix A,
compliance specifications, as well as additional features.
Appendix B,
VSU-2000 crossover cabling between the VSU-2000 and a router.
Introduction
Installing the VSU-2000
Preparing the VSU-2000 for Configuration
Specifications
10/100BASE-T UTP Crossover Cable Pinouts
, includes a functional over view of the VSU-2 000 and i t s
, provides instructions for physical
, provides instructions for
, documents physical, environmental, electrical, and
Added FIPS Mode and General Firm ware
Upgrade Imformation
To register the VSU-2000, navigate to
Wide Web.
Contacting Technical Support
Technical support is available to registered users of the VSU-2000.
Voice: 1-888-VPNET-88 (within U.S.) or +1 408-404-1400 (outside U.S.)
•
FAX: +1 408-404-1414
•
Email:
•
World Wide Web:
•
support@vpnet.com
http://www.vpnet.com
http://www.vpnet.com
on the World
ii
Chapter 1Intr oduction
Functional Overview
The VSU-2000 is a VPN gateway to create virtual private networks (VPNs)
within a small to medium sized business/branch office. Designed to provide the
convenience of a virtual private network gateway and a firewall all in one
compact rack-mountable enclosure, the VSU-2000 provides a cost-effective
solution to quick and easy VPN deployment.
Figure 1-1The VSU-2000
Like other gateways in the VPNware family, the VSU-2000 adds compression,
encryption, authentication, and key management to public network data links to
ensure privacy and integrity of corporate data, and to enable the efficient and
secure operation of virtual private networks (VPNs). It is designed to perform
complex operations, in real time, without compromising network performance,
and in many cases can actually increase data throughput. The VSU-2000
supports up to 1000 simultaneous tunnels.
Introduction1-1
VSU-2000 User Guide
The VSU-2000 supports a full suite of VPN services including: ICSA-certified
IPSec-based encryption, data compression, packet and user authentication, IKE
and SKIP key management, Network Address Translation (NAT), routing, and a
network firewall (packet filtering).
Security
The VSU-2000 provi des data st ream privacy by employing cryptographic
algorithms and keys powerful enough for the most sensitive business
communications. The VSU-2000 supports 56-bit DES and 168-bit 3DES
encryption, as well as the ISAKMP and SKIP key management standards.
Data authenticity is assured by using MD5
reject altered or forged packets. All security mechanisms employed by the
VSU-2000 conform to Internet Engineering Task Force RFCs, in order to
provide interoperability and broaden the use of VPN technology.
or SHA-1 hashing algorithms to
™
Performance
The VSU-2000 supports IP over 10BASE-T or 100BASE-T local area networks
(LANs). When packets are encrypted and authenticated according to IPSec
protocol guidelines, additional bytes—in the form of IPSec headers—must be
added to packets. In many cases, the additional packet overhead imposes a
performance penalty in return for security. The extra bytes tend to lengthen
packets and reduce the throughput (measured in packets per second). Of even
greater impact is the tendency for packets lengthened by IPSec headers to be
fragmented by network routers, causing further reductions in performance and
additional latency. Real-time compression performed by the VSU-2000
eliminates packet fragmentation and produces fewer, smaller packets, which can
significantly enhance network throughput and performance.
Plug-and-Play Installation
The VSU-2000 can be placed anywhere in a 10/100BASE-T LAN to provide
VPN functionality. Native support for IP ensures that the VSU-2000
interoperates transparently with the broadest range of intranet and other network
applications.
The graphical VPNmanager™ (available separately) network management
application steps network managers through the setup process and allows them to
configure a VPN in minutes. The VPNmanager also supports extensive facilities
for VPN monitoring and troubleshooting, and for establishing multi-company
1-2Introduction
VSU-2000 User Guide
extranets. The VSU-2000 provides support for the RADIUS protocol, enabling
VPNs that support hundreds of remote users and a variety of mechanisms for
remote user authentication.
VSU-2000 Components
Each of the major VSU-2000 components are shown in Figures 1-2 and 1-3.
Console Port
Figure 1-2VSU-2000 Front Panel
Private Port
Public Port
Ethernet Ports
Status Indicators
Unit Status
Indicators
Power On
Indicator
Power Switch
AC Power
Connector
Figure 1-3VSU-2000 Back Panel
Ethernet Ports
The VSU-2000 includes two 10/100BASE-T Ethernet ports. One port is
designated as the public (encrypted) interface and the other port is designated as
the private (unencrypted) interface.
NOTE:
NIST FIPS 140-1 Level Physical Security and may be replaced only by an
authorized service technician.
Introduction1-3
The VSU-2000 is enclosed in a tamper-evident case that meets U.S.
VSU-2000 User Guide
Status Indicators
The status indication LEDs on each of the two Ethe rnet po rts and th e Unit Status
Indicators are defined in Figure 1-4.
When LAN traffic is detected on the public port, the LAN status indicator will
blink. When VPN traffic is detected on the private port, the VPN status indicator
will blink. The rate at which the LAN and VPN status indicators blink is the
result of the rate of traffic detected on each p ort. The ON status ind icator remains
lit to indicate the unit is powered up.
Activity
LAN
VPN
ON
Link
ON = Full Duplex
OFF = Half Duplex
ON = 100 Mbps Connection
OFF = 10 Mbps Connection
Figure 1-4VSU-2000 Status Indicators
General Site Requirements
This section describes the requirements your site must meet for safe installation
and operation of your system. Ensure that your site is properly prepared before
beginning installation.
Environmental Requirements
The VSU-2000 is intended for use in a normal office or data room environment.
For more extreme conditions, verify that temperature, humidity, and power
conditions meet the specifications indicated in Table 1-1.
Table 1-1Environmental Requirements
ItemOperating Specification
Temperatur e32° to 104° F, 0° to 40°C
Relative Humidity5-90%, non-cond ensing
Altitude0-12,000 feet, 0-3,660 meters
Volta g e85-264 VAC
1-4Introduction
VSU-2000 User Guide
Table 1-1Environmental Requirements
ItemOperating Specification
Input Frequency47-440 Hz
AC input current1 Amp Maximum
Additional VSU-2000 specifications are included in Appendix A.
Site Power Consideration s
Check the power at your site to ensure that you are receiving “clean” power (free
of spikes and noise). Install a power conditioner if necessary.
WARNING:
This product relies on the building's installation for short-circuit
(overcurrent) protection. Ensure that a fuse or circuit breaker no larger than 120
VAC, 15A U.S. (240 VAC, 10A international) is used on the phase cond uctor (al l
current-carrying conductors).
Required Equipment
The VSU-2000 shipping carton contains:
QuantityPart Description
1VSU-2000 VPN Service Unit
1VSU-2000 VPN Service Unit User Guide
1UTP Crossover Cable (for connection to a router)
1Null Modem Cable (for connection to the VSU Console port)
1Power cord (110V) or Power cord (230V)
1Rack mount kit including two mounting bracke ts and screws for
attaching the brackets to the VSU-2000. Screws required to mount the
unit to the rack must be provided by the customer.
4Rubber feet for desktop installations
To install and use the VSU-2000 in a typical network, the customer must supply:
•
•
Introduction1-5
Router providing connectivity to a WAN such as the Internet
10/100BASE-T Ethernet hub, router, or switch providing connectivity to a
LAN
VSU-2000 User Guide
An asynchronous ASCII terminal supporting RS-232 or a PC running
•
terminal emulation software to provide initial IP configuration (IP address,
subnet mask, default router)
PC workstation running VPNmanager software to conf igure the VSU-2000 in
•
the VPN
Configuring Equipment Racks
The VSU-2000 can be placed on a desktop, shelf, or mounted in a standard
19-inch equipment rack. The location of the unit and the layout of your
equipment rack or wiring room are extremely important for proper system
operation. Equipment placed too close together, inadequate ventilation, and
inaccessible panels can cause system malfunctions and shutdowns, as well as
make system maintenance difficult.
The following information will help you plan an acceptable equipment rack
configuration.
Enclosed racks must have adequate ventilation. Ensure that the rack is not
•
overly congested because each unit generates heat. An enclosed rack should
have louvered sides and a fan to provide cooling air.
When mounting a chassis in an open rack, ensu re that the rack f rame does not
•
block the ventilation grates. If the chassis is installed on slides, check the
position of the chassis when it is seated all the way into the rack.
In an enclosed rack with a ventilation fan in the top, exces sive heat gen erated
•
by equipment near the bottom of the rack can be drawn upward and into the
ventilation grates of the equipment above it in the rack. Ensure that you
provide adequate ventilation for equipment at the bottom of the rack.
Instructions for rack mounting are provided in the section “Rackmount
Installation” on page 2-1.
1-6Introduction
Chapter 2Installing the VSU-2000
Rackmount Installation
The VSU-2000 ships with a VSU rackmount bracket kit, which includes two
L-shaped brackets that attach to the sides of the VSU-2000 and to the front of a
standard 19-inch eq ui pm ent rack. Referring to Fig ure 2-1, perform the following
procedure to install the VSU-2000 to a standard 19-inch equipment rack:
From one side of the VSU-2000, remove the two front side screws.
1.
Using the flat-head screws, provided with the bracket, attach the bracket to
2.
the VSU-2000.
Repeat previous steps to attach the br acket on the ot her side of the VSU-2000.
3.
Install the VSU-2000 into a standard 19-inch rack.
4.
NOTE:
Rack screws are not provided with the VSU.
Installing the VSU-20002-1
VSU-2000 User Guide
Figure 2-1Installing the Rackmount Brackets
2-2Installing the VSU-2000
VSU-2000 User Guide
Connecting the VSU-2000 to the Network
Figure 2-2 shows a typical network using the VSU-2000.
Private LAN
Hub, Switch, Router
Private Port
VSU-2000
Public Port
Router
Public
Network
Figure 2-2Typical VSU-2000 Hardware Installation
Installing the VSU-20002-3
The VSU-2000 front panel is shown in Figure 2-3.
Connect Cables between
the VSU-2000 Public Port and the Router
Connect Cable between the
VSU-2000 Private Port and the Private LAN
Figure 2-3VSU-2000 Front Panel Connectors
The console port accepts an RS-232 DB-9 connection from an asynchronous
ASCII terminal or a PC running terminal emulation software. The connection
requires a null modem cable, which is supplied.
VSU-2000 User Guide
The communication settings for a terminal or PC connected to the console port
are provided in Table 2-1.
Table 2-1Terminal Settings
ParameterSetting
Baud9600
Data Bits8
Stop bits1
ParityNone
Flow controlHardware (RTS/CTS)
The two Ethernet ports are 10/100BASE-T compliant host ports. They accept
category 5 UTP cabling terminated in an RJ-45 connector per IEEE 802.3
requirements for 10/100BASE-T. The Ethernet ports do not provide a cross-over
function; therefore a cross-over cable, (provided with the unit), is required when
connecting the VSU-2000 public port directly to a router.
2-4Installing the VSU-2000
VSU-2000 User Guide
Perform the following steps to install the VSU-2000 in a typical LAN:
Connect the VSU-2000 to the router on the public (encrypted) side of the
1.
LAN using the supplied UTP crossover cable.
Connect the VSU-2000 to the private (unencrypted) side of the LAN.
2.
Using a standard straight-through 10/100BASE-T UTP cable, connect one of
its RJ-45 connectors to the VSU-2000 private port and the second one to the
hub or switch on the private LAN.
Connect an asynchronous ASCII terminal or PC running terminal emulation
3.
software to the VSU-2000 console port using the RS-232 null modem cable
that came with the VSU-2000.
The terminal’ s commu nications parameter s should be set to 9600 baud, 8 data
bits, 1 stop bit, no parity, and RTS/CTS hardware flow control.
Connect the AC power cable then power on the VSU-2000 and proceed to
4.
Chapter 3, Preparing the VSU-2000 for Configuration
.
Installing the VSU-20002-5
VSU-2000 User Guide
2-6Installing the VSU-2000
Chapter 3Pr eparing the VSU-2000 for
Configuration
Preparation
Before the VSU-2000 can be incorpo rated into a Virtual Private Network (VPN),
it must be configured through the VPNmanager. However, to enable
communication between the VPNmanager and the VSU-2000, you must first
assign an IP address, subnet mask, and default route to the VSU-2000.
This chapter describes how to set up the VSU-2000 addressing and remote
connectivity capabilities in preparation for remote configuration using the
VPNmanager software. This preliminary configuration is performed using a
terminal (or a PC running terminal emulation software) connected to the RS-232
console port.
The following procedure assumes that the VSU-2000 has been physically
installed on the network, according to the instructions provided in Chapter 2
Configuration
Beginning with VPNware 3.1, the following information is configured through
the VSU console Quick Setup:
The VSU’s IP address and mask.
•
The VSU’s secondar y IP address and mask (Optional).
•
The VSU’ s defau lt route.
•
The VSU console password. Beginning with VPNware 3.1, if you forget this
•
password and need console access, it can be changed through the
VPNmanager’s Configuration console. Select the VSU Advanced Action tab,
then the Reset Password dialog box.
Preparing the VSU-2000 for Configuration3-1
VSU-2000 User Guide
The SuperUser name. This is the name that is a uthor i zed to perfo rm any ki nd
•
of configuration request on a VSU. This name is provided by the
VPNmanager administrator the first time the VSU is added into the
VPNmanager database. The SuperUser name is case sensitive.
The SuperUser password. This password authenticates the SuperUser name.
•
The SuperUser password is case sensitive. If the VPN administrator forgets
the SuperUser password, the VSU may still be reconfigured through the VSU
console Quick Setup menu as long the administrator has access to the VSU
console and knows the VSU console password.
Configuration of blockin g mode. This in volves selecting one of three filter ing
•
choices according to your organization’s security policy:
Permit all non-VPN traffic - When checked (default), all non VPN traf fic is
allowed to pass through the VSU.
Deny all IP non-VPN traffic - When checked, all non-IP traffic is passed
through the VSU. All non-VPN IP traffic is dropp ed except f or the following:
ICMP, IGMP, GGP, EGP, IGP, DGP, EIGRP, and OSPF. NOTE:
This mode
should be used when the VSU dedicated to VPN traffic and is the only device
between the private and the public networks.
Deny all non-VPN traffic - When checked, all non-VPN traffic is prevented
from passing through the V SU. This mode blocks n on-IP traf fic and non-VPN
IP traffic including broadcast traffic (e.g. ARPs), IP-multicast traffic (e.g.
OSPF updates) and othe r traffic con t aining routing infor mation. NOTE:
This
mode should be used when the VSU is dedicated to VPN traffic and is in
parallel with another device (such as a router or fir ewall) that will enfor ce the
network's non-VPN traffic policy. This mode should not be used when the
VSU is the only path between network devices and a router with which those
devices need to communicate.
Setting the unit to run in FIPs-compliant mode or not.
•
The current time and date.
•
NOTE:
Each of these items are preserved over firmware upgrades.
When the VSU-2000 is powered on for the first time, the terminal screen should
display the initial power on bootup screen shown in Figure 3-1.
3-2Preparing the VSU-2000 for Configuration
VSU-2000 User Guide
VPNet Service Unit Model XXXX 3DES ENCRYPTION
Runtime System version x.x.xx, x/xx/2000
Copyright (C) 1996-2000 VPNet Technologies, Inc. All Rights
Reserved.
-- Month Day 2000, 17:06:01 --ethernet0: MAC Address
00:60:a1:00:23:f9
ethernet1: MAC Address 00:60:a1:00:23:fa
ethernet2: MAC Address 00:60:a1:00:16:9a
ethernet3: MAC Address 00:60:a1:00:16:9b
Checking Non Volatile RAM integrity... OK
Checking Configuration Database... OK
Checking Certificate Database... OK
Calibrating CPU performance monitor... OK
Power/Cooling subsystems Monitor initializing...
Power Subsystem is Good.
Cooling Subsystem Good.
...Done.
VPNet Technologies - VSU XXXX 3DES ENCRYPTION - Main Menu
1) Configuration
2) Statistics
3) Utilities
4) Logout
5) Quick Setup
Your choice [1-5]:
Figure 3-1Initial Power On Bootup Screen for VSU
Preparing the VSU-2000 for Configuration3-3
VSU-2000 User Guide
Preconfigure the VSU-2000 to communicate with the VPNmanager using the
Quick Setup menu selection as described below:
From the Main Menu, select
1.
VPNet Technologies - VSU XXXX- Main Menu
1) Configuration
2) Statistics
3) Utilities
4) Logout
5) Quick Setup
Your choice [1-5]: 5
5) Quick Setup.
You will be prompted for the information required to set up the VSU. To
accept the current value and go to the next prompt, press Return.
Enter the IP address and netmask assigned to the VSU.
2.
NOTE:
IP address: 192.0.2.1 Mask: 255.255.255.0
IP address: 210.1.18.135
IP mask: 255.255.255.0
Do you want a secondary IP address on this unit? [yn] y
The Secondary IP address and mask are optional.
Secondary IP address: Secondary Mask: 255.0.0.0
Secondary IP address: 10.0.0.1
Secondary IP mask: 255.255.255.0
Enter the default route for this VSU.
3.
Default Route is not configured.
Enter Default Route: 210.1.18.1
Typically, the default route is the IP address of the gateway router that
provides an IP route between the VSU-2000 and the public network (e.g.,
Internet).
3-4Preparing the VSU-2000 for Configuration
VSU-2000 User Guide
To prevent unauthorized users from accessing the VSU-2000 through the
4.
console port, enter and confirm the new VSU console password.
VSU Console password may be up to 31 characters.
Enter new VSU console password: ******
Confirm new VSU console password: ******
CAUTION:
Do not forget this password. As a security measur e, the only way
to bypass an unknown console password is to return the VSU-2000 to the
factory at the customer’s expense.
The password may be up to 31 characters in length and is case-sensitive.
Once the password is set, it must be entered to gain future access to the VSU
console.
Pressing Return without typing anything at the “Enter new VSU console
password” and “Confirm new VSU console password” prompts will set the
VSU console password to empty (no password required).
A superuser name and password is required to allow the Network
5.
Administrator to initially configure this VSU through the VPNmanager
application.
This VSU's superuser name is: "root". Change superuser name?
[yn] y
This VSU's superuser name may be up to 31 characters.
Enter new superuser name: superuser
This VSU's superuser password may be up to 31 characters.
Enter new superuser password: ******
Confirm new superuser password: ******
Preparing the VSU-2000 for Configuration3-5
Press Return or enter “n” to leave the superuser name at its default value of
root, or enter “y” to change the superuser name.
Both the superuser name and password may be up to 31 characters and are
case-sensitive. The name and password will be required later when first
setting up the VSU through the VPNmanager application. After the VSU has
been initially set up, the VSU may use the VPNmanager Directory Server to
authenticate a configuration request, at the Network Administrator’s option.
VSU-2000 User Guide
Non-VPN traffic mode: non-VPN traffic is currently
forwarded.
Non-VPN Traffic Configuration Menu
1) Permit all non-VPN traffic
2) Deny IP non-VPN traffic only
3) Deny all non-VPN traffic
P) Previous menu
Your choice [1-3]:
Select a traffic mode from the Traffic Configuration Menu.
6.
Permit all non-VPN traffic - When checked (default), all non VPN traf fic is
allowed to pass through the VSU.
Deny all IP non-VPN traffic - When checked, all non-IP traffic is passed
through the VSU.
Deny all non-VPN traffic - When checked, all non-VPN traffic is prevented
from passing through the VSU.
For additional information regarding t raffic modes, see page 3-2.
Do you want this unit to run in FIPs-compliant mode? [yn] y
Enter “n” if you do not want the VSU to run in FIPs-compliant mode. If you
7.
answer “n”, the code skips to the date and time configuration. Go to Step 7.
Enter “y” if you want the VSU to run in FIPs-compl iant mode. If yo u answer
“y”, answer the following configuration questions. For more information
regarding FIPS, see “FIPS Mode” on page 3-8.
FIPs-compilant mode may only be disabled via VPNmanager.
Please confirm that you want this unit to run in FIPscompilant mode. [yn] y
3-6Preparing the VSU-2000 for Configuration
VSU-2000 User Guide
Enter the current date and time.
8.
Date: 3-9-2000
Enter date [MM-DD-YYYY]:
Time: 13:51:53
Enter time [HH:MM:SS]:
This date and time setting are primarily used to ensure accurate timestamps
when logging events. When changing either the date or time, all thr ee parts o f
the date (MM-DD-YYYY) or time (HH:MM:SS) must be entered. A 24-hour
clock is used when setting the time. For example, 13:00:00 is equivalent to
1:00 PM.
Reboot the VSU-2000.
9.
Reboot is required to complete Quick Setup. Reboot Now? [yn]
y
Y ou r VSU-2000 is now prepared for configuration by using the VPNmanager.
The VSU initially passes all traffic between its Public and Private ports. This
would be a good time to verify connectivity by pinging the VSU from public
and private machines, and by passing traffic between public and private
machines.
Proceed to the
VPNmanager Administrator Guide
to continue configuring
your VSU.
Preparing the VSU-2000 for Configuration3-7
FIPS Mode
FIPS (Federal Information Processing Standards) Mode forces the VSU to
operate in a FIPS 140-1 Level 2 compliant mode. It is recommended that this
mode only be used if your organization’s policy requires FIPS 140-1 Level 2
certification for cryptographic devices.
Note that in the FIPS mode (as dictated by the FIPS 140-1 requirements
specification), the following are NOT supported:
SKIP VPNs
•
VPNremote 2.5x Clients
•
Any encryption algorithm other than DES or 3DES
•
Any authentication algorithm other than SHA-1
•
General Firmware Upgrade Information
VSU-2000 User Guide
Configuration Items Left to the VPNmanager
The following items are likely to be configured by most administrators, but are
left to VPNmanager or other VSU console menu items to keep the Quick Setup
menu minimal:
LDAP servers used to authenticate VPNmanager console users.
•
Disable a VSU’s SuperUser account.
•
Flushing the configuration on VPNware 3.1
In the event you flush the configuration (via VSU console menu item
Configuration->Flush Configuration) on a VSU running VPNware 3.1 the
following occurs:
The superuser name will be “root”.
•
There will be no superuser password.
•
If a VSU console password is configured, it will be preserved.
•
The secondary IP address will be empty.
•
The blocking mode will be set to forward all non-VPN traffic.
•
3-8Preparing the VSU-2000 for Configuration
APPENDIX A
Specifications
Packet Encryption
DES encryption (56-bit key)
•
Triple DES (EDE-CBC) encryption (168-bit key)
•
Weak and semi-weak keys are automatically discarded
•
Packet Authentication
Keyed MD5™ AH Message D igest Algorithm (RFC 13 21)
Internal Battery (End user non-serviceable part): CAUTION: Danger of explo sion if
•
memory backup battery is incorrectly replaced. Rep lac e only with the same or
equivalent type re c ommended by the manu fa cturer. Dispose of us e d ba tte ri e s
according to the manufacturer’s instructions.
VSU-2000 User GuideA-3
Specifications
Operating Environment
Temperature: 32° to 104° F, 0 to 40°C
•
Relativ e Humidity: 5 to 90% (non-condensing)
•
Altitude: 0-12,000 feet, 3660 meters
•
Safety Certification
UL, CSA, CE, CB Scheme
•
EMI/RFI
FCC Part 15, Class A, CISPR 22/85A
•
VCCI
•
A-4VSU-2000 User Guide
APPENDIX B
10/100BASE-T UTP
Cr ossover Cable Pinouts
The 10/100BASE-T UTP Crossover Cable defined below is provided with the
VSU-2000.
Signal NameMale RJ-45Male RJ-45
TX+13
TX-26
RX+31
RX-62
VSU-2000 User GuideB-1
10/100BASE-T UTP Crossover Cable Pinouts
VSU-2000 User GuideB-2
GLOSSARY
VSU Acr onyms
CBC – Cipher Block Chaining encryption
DES – Data Encryption Standard encryption
DNS – Domain Name Server (a distributed database system used to map host
names to IP addresses and vice versa)
DCE – Data Communication Equipment
DSU/CSU – Data Service Unit/Channel Service Unit
DTE – Data Terminal Equipment
ECB – Electronic Code Book encryption
HDLC – High-level Data Link Control
ISAKMP – Internet Security Association Key Management Protocol
IPSEC – Internet Protocol SECurity
MD5 – Message Digest Algorithm
VSU-2000 User GuideG-1
PPP – Point to Point Protocol
RADIUS – Remote Authentication Dial-In User Server
RFC – Request For Comment
SHA – Secure Hash Algorithm
SKIP – Simple Key Management for Internet Protocol
SNMP – Simple Ne t work Manage ment Protocol
SSL – Secure Socket Layer
TCP/IP – Transmission Control Protocol / Internet Protocol
URL – Uniform Resource Locator
UTP – Unshielded Twisted Pair
VPN – Virtual Private Network
VSU – VPN Service Unit
G-2VSU-2000 User Guide
Index
B
bootup screen 3-2
C
configuration
preparation 3-1
configuring
using quick setup menu 3-4
connections
Ethernet LAN 2 -5
router 2-5
console pas s w or d 3-5
contacting VPNet 1-ii
D
date and time 3-6
default route 3-4
DES 1-2
E
email support 1-ii
environmental requirem ent s 1-4
equipment
provided by customer 1-5
provided by VPNnet 1-5
F
FAX support 1-ii
I
installation
desktop 2-1
rackmount 2-1
IP address 3-4
IPSec standards 1-2
L
LAN connect i on s 2-5
N
netmask 3-4
P
password
VSU console 3-5
performance 1-2
phone support 1-ii
plug-and-play installation 1-2
power on bootup screen 3-2
product registration 1-ii
Q
quick setup menu 3-4
R
reboot 3-7
registration 1-ii
requirements
environmental 1-4
router conne ctions 2-5
S
security 1-2
SHA1 1-2
SKIP 1-2
specifications A-1
T
technical support 1-ii
terminal settings 2-4
time 3-6
triple DES 1-2
V
VPNmanager 3-1, 3-7
VSU console password 3-5
W
world wide web support 1-ii
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.